CIS: Windows Server 2019
This document provides information about the hotfix containing Center for Internet Security (CIS) templates for Windows Server 2019 with implementation for 401 rules that can be installed on TrueSight Server Automation 8.9.04.001 or later. This template is created based on the recommended settings defined by Microsoft Windows Server 2019 RTM (Release 1809) Security Configuration Benchmark Version 1.1.0, published on January 14, 2020.
Before you begin
Before you install this hotfix, ensure that all compliance content provided by BMC in your environment is at least updated to 8.9.04.001 or later version.
Step 1: Downloading and installing the files
- Login to the ftp.bmc.com host using the SFTP protocol.
Download the CIS - Windows Server 2019.zip package from the following location:
- Copy the CIS - Windows Server 2019.zip package to your RCP client server.
Step 2: Importing the compliance content
- Log on to the console.
- Right-click Component Templates and select Import.
- In the Import Wizard window, select Import (Version-neutral).
- Select the CIS - Windows Server 2019.zip package that you downloaded and click Next.
To import the templates, select the CIS - Windows Server 2019.zip file and click Next.
- Click Next to review the import contents and then click Back > Finish.
The templates are imported successfully.
Rules within the templates
The following are the details of the 401 rules provided in the zip package. It contains the following types of rules:
- Rules that check for compliance and provides remediation - 378
- Rules that check for compliance but do not provide remediation - 23
The following are the details of the rules that are divided into parts:
- Rules not divided into parts - 375
- Rules divided into two parts (Rule ID 18.8.22.1.13, 18.8.25.1, 18.9.80.1.1, 18.9.102.1.1, 18.9.102.1.3) - (5 * 2) = 10
- Rules divided into three parts (Rule ID 18.9.102.1.2) - (1 * 3) = 3
- Rules divided into four parts (Rule ID : 18.5.9.1, 18.5.9.2) - (2 * 4) = 8
- Rules divided into five parts (Rule ID : 18.5.20.1) - (1 * 5) = 5
So, the current rule count according to CIS Windows 2019 template after running the compliance job is 401 (375 + 10 + 3 + 8 + 5).
Rule IDs without remediation and undo | Comments |
---|---|
1.2.1, 1.2.3 | No remediation is provided as both GPO's Reset account lockout Counter after (Rule ID 1.2.3) and Account lockout duration (Rule ID 1.2.1) have dependency and it should be resolved manually in case of non compliant. |
2.3.1.5 , 2.3.1.6 | The remediation requires user input that must be provided by the organization. |
18.2.1, 18.5.14.1 | None |
18.9.77.13.1.2 | None |
18.8.21.5 | None |
Section 19 Rules (19.1.3.1, 19.1.3.2, 19.1.3.3, 19.1.3.4, 19.5.1.1, 19.6.6.1.1, 19.7.4.1, 19.7.4.2 , 19.7.7.1, 19.7.7.2, 19.7.7.3, 19.7.7.4, 19.7.26.1, 19.7.41.1, 19.7.45.2.1) | None |
Property type | Rule where the property is used | Property name | Default values | Delimiter |
---|---|---|---|---|
LOCAL | 1.1.4 | MIN_PASSWD_LENGTH | 14 | |
LOCAL | 2.2.21 | DENY_ACCESS_FROM_NETWORK | BUILTIN\Guests | |
LOCAL | 2.2.26 | DENY_LOG_ON_THROUGH_THE_REMOTE_DESKTOP_SERVICES | BUILTIN\Guests | Comma (,) |
LOCAL | 2.3.7.4 | CIS_LEGAL_NOTICE_TEXT | BLANK | |
LOCAL | 2.3.7.5 | INTERACTIVE_LOGON_MESSAGE_TITLE | BLANK | |
LOCAL | 19.1.3.2 | SCREEN_SAVER_EXECUTABLE | BLANK | |
LOCAL | 2.3.1.5 | RENAME_ADMINISTRATOR_ACCOUNT | BLANK | |
LOCAL | 2.3.1.6 | RENAME_GUEST_ACCOUNT | BLANK | |
LOCAL | 2.3.11.3 | ALLOW_PKU2U_AUTHENTICATION_REQUESTS | 0 |